jupyter-collection

Collection of Jupyter Notebooks by @fr0gger_

View on GitHub

Binder

Notebooks

This repository is a collection of some of my Jupyter Notebook applied to cybersecurity and threat intelligence. If you want to play with the code you can run it here

BlackBasta Leak Analysis and Hybrid RAG

This is a Marimo notebook that demonstrates how to analyze the BlackBasta data leak. It also uses a hybrid search RAG to retrieve the most relevant information from the leak.
Published: 22 February 2025

I-SOON Data Leak Analysis using OCR and Generative AI

This notebook demonstrates how to analyze a data leak in Chinese from PNG files leveraging python, OCR, Translation and Generative AI.
Published: 21 February 2024

Retrieved Augmented Generation (RAG) and ATT&CK

This notebook demonstrates how to construct a Retrieval-Augmented Generation (RAG) model using a Large Language Model (LLM), integrated with the ATT&CK framework, to create your own MITRE assistant powered by LLM.
Published: 03 November 2023

Threat Report Summarization Using LLMs and Few-Shot Learning

This notebook is an experiment designed to demonstrate the application of few-shot learning for summarizing threat reports and generating a mind map of the key findings.
Published: 27 September 2023

Pulsedive Lookup Using MSTICpy

This notebook demonstrates how to use MSTICpy to query Pulsedive.
Published: 10 March 2023

ELK Threat Hunting

This notebook demonstrates how to connect to an ElasticSearch instance to retrieve the data and analyse them. The dataset used here is from MalwareBazaar.
Published: 10 September 2022

Malware Bazaar Lookup Using MSTICpy

This notebook demonstrates how to use MSTICpy to query the Malware Bazaar database.
Published: 12 August 2022

10 Python Libs for Malware Analysis and Reverse Engineering

This notebook demonstrates 10 python libraries useful for malware analysis and reverse engineering.
Published: 08 June 2022

Conti Leaks Analysis

This notebook demonstrates a simple way to analyze the Conti Leaks chat logs using Python and msticpy. It proposes a methodology for threat researchers and allows to extract relevant information using Python and visualization.
Published: 02 June 2022

VT Domain Hunting using MSTICpy

Notebook to hunt for domains relationship using msticpy.
Published: 19 May 2022

IoCExtractor using MSTICpy

POC to extract Indicator of Compromised from url using msticpy.
Published: 31 March 2022

Strings Similarity Experimentation

This notebook shows some experiementation with strings similarity using Jaccard distance, hashing and visualization.
Published: 25 July 2020

Support or Contact

You can contact me on Twitter: @fr0gger_